{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T06:46:38Z","timestamp":1764225998777,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3678890.3678896","type":"proceedings-article","created":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T22:23:36Z","timestamp":1727648616000},"page":"546-560","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Deception-Resistant Stochastic Manufacturing for Automated Production Lines"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1596-6890","authenticated-orcid":false,"given":"Zeyu","family":"Yang","sequence":"first","affiliation":[{"name":"Zhejiang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0759-5815","authenticated-orcid":false,"given":"Hongyi","family":"Pu","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0741-8795","authenticated-orcid":false,"given":"Liang","family":"He","sequence":"additional","affiliation":[{"name":"University of Nebraska-Lincoln, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5788-7281","authenticated-orcid":false,"given":"Chengtao","family":"Yao","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0594-0432","authenticated-orcid":false,"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4221-2162","authenticated-orcid":false,"given":"Peng","family":"Cheng","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3155-3145","authenticated-orcid":false,"given":"Jiming","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, China and Hangzhou Dianzi University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Detailed information for: RobotStudio. https:\/\/new.abb.com\/products\/3HAC031177-001\/robotstudio. [Online","author":"ABB.","year":"2023","unstructured":"ABB. 2023. Detailed information for: RobotStudio. https:\/\/new.abb.com\/products\/3HAC031177-001\/robotstudio. [Online; Accessed May 2023]."},{"key":"e_1_3_2_1_2_1","volume-title":"How do we implement Robotic Process Automation?https:\/\/new.abb.com\/news\/detail\/101946\/how-do-we-implement-robotic-process-automation. [Online","author":"ABB.","year":"2023","unstructured":"ABB. 2023. How do we implement Robotic Process Automation?https:\/\/new.abb.com\/news\/detail\/101946\/how-do-we-implement-robotic-process-automation. [Online; Accessed June 2023]."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2875008"},{"key":"e_1_3_2_1_4_1","volume-title":"APT Cyber Tools Targeting ICS\/SCADA Devices. https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-103a. [Online","author":"Advisory ICS","year":"2023","unstructured":"ICS Advisory. 2022. APT Cyber Tools Targeting ICS\/SCADA Devices. https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-103a. [Online; Accessed June 2023]."},{"key":"e_1_3_2_1_5_1","volume-title":"Airbus inaugurates new A320 structure assembly line in Hamburg. https:\/\/www.airbus.com\/en\/newsroom\/press-releases\/2019-10-airbus-inaugurates-new-a320-structure-assembly-line-in-hamburg. [Online","author":"Airbus AG.","year":"2023","unstructured":"Airbus AG. 2019. Airbus inaugurates new A320 structure assembly line in Hamburg. https:\/\/www.airbus.com\/en\/newsroom\/press-releases\/2019-10-airbus-inaugurates-new-a320-structure-assembly-line-in-hamburg. [Online; Accessed June 2023]."},{"key":"e_1_3_2_1_6_1","volume-title":"Hier sind die Industrie-4.0-Roboter: Intelligente Automatisierung im KUKA Werk. https:\/\/www.youtube.com\/watch?v=-PGrqcNtB7M. [Online","author":"KUKA AG.","year":"2023","unstructured":"KUKA AG. 2019. Hier sind die Industrie-4.0-Roboter: Intelligente Automatisierung im KUKA Werk. https:\/\/www.youtube.com\/watch?v=-PGrqcNtB7M. [Online; Accessed June 2023]."},{"key":"e_1_3_2_1_7_1","volume-title":"Programming with STEP 7. https:\/\/cache.industry.siemens.com\/dl\/files\/825\/109751825\/att_933142\/v1\/STEP_7_-_Programming_with_STEP_7.pdf. [Online","author":"Siemens AG.","year":"2023","unstructured":"Siemens AG. 2017. Programming with STEP 7. https:\/\/cache.industry.siemens.com\/dl\/files\/825\/109751825\/att_933142\/v1\/STEP_7_-_Programming_with_STEP_7.pdf. [Online; Accessed June 2023]."},{"key":"e_1_3_2_1_8_1","volume-title":"Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation. In International Conference on Dependable Systems and Networks (DSN). IEEE, 395\u2013406","author":"Alemzadeh Homa","year":"2016","unstructured":"Homa Alemzadeh, Daniel Chen, Xiao Li, Thenkurussi Kesavadas, Zbigniew\u00a0T Kalbarczyk, and Ravishankar\u00a0K Iyer. 2016. Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation. In International Conference on Dependable Systems and Networks (DSN). IEEE, 395\u2013406."},{"key":"e_1_3_2_1_9_1","volume-title":"Demo: Mounting Deception Attacks to Automated Production Lines. https:\/\/youtu.be\/zgOkaqLvPyE. [Online","author":"Anonymous","year":"2023","unstructured":"Anonymous. 2023. Demo: Mounting Deception Attacks to Automated Production Lines. https:\/\/youtu.be\/zgOkaqLvPyE. [Online; Accessed May 2023]."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243781"},{"key":"e_1_3_2_1_11_1","first-page":"723","article-title":"Exploiting Siemens Simatic S7 PLCs","volume":"16","author":"Beresford Dillon","year":"2011","unstructured":"Dillon Beresford. 2011. Exploiting Siemens Simatic S7 PLCs. Black Hat USA 16, 2 (2011), 723\u2013733.","journal-title":"Black Hat USA"},{"key":"e_1_3_2_1_12_1","unstructured":"Eli Biham Sara Bitan Aviad Carmel Alon Dankner Uriel Malin and Avishai Wool. 2019. Rogue7: Rogue Engineering Station Attacks on S7 Simatic PLCs. In BlackHat USA."},{"key":"e_1_3_2_1_13_1","volume-title":"INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems. https:\/\/www.mandiant.com\/resources\/blog\/incontroller-state-sponsored-ics-tool. [Online","author":"Brubaker Nathan","year":"2022","unstructured":"Nathan Brubaker, Keith Lunden, Ken Proska, Muhammad Umair, Daniel\u00a0Kapellmann Zafra, Corey Hildebrandt, and Rob Caldwell. 2022. INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems. https:\/\/www.mandiant.com\/resources\/blog\/incontroller-state-sponsored-ics-tool. [Online; Accessed June 2023]."},{"key":"e_1_3_2_1_14_1","volume-title":"SSA-381684: Improper Password Protection during Authentication in SIMATIC S7-300 and S7-400 CPUs and Derived Products. https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-381684.pdf. [Online","author":"Siemens","year":"2023","unstructured":"Siemens Security\u00a0Advisory by Siemens\u00a0ProductCERT. 2020. SSA-381684: Improper Password Protection during Authentication in SIMATIC S7-300 and S7-400 CPUs and Derived Products. https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-381684.pdf. [Online; Accessed June 2023]."},{"key":"e_1_3_2_1_15_1","volume-title":"Analysis of the Cyber Attack on the Ukrainian Power Grid","author":"Case Defense\u00a0Use","year":"2016","unstructured":"Defense\u00a0Use Case. 2016. Analysis of the Cyber Attack on the Ukrainian Power Grid. Electricity Information Sharing and Analysis Center (2016)."},{"key":"e_1_3_2_1_16_1","volume-title":"Hacking Robots Before Skynet. IOActive Website","author":"Cerrudo Cesar","year":"2017","unstructured":"Cesar Cerrudo and Lucas Apa. 2017. Hacking Robots Before Skynet. IOActive Website (2017), 1\u201317."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243752"},{"key":"e_1_3_2_1_18_1","volume-title":"International Symposium on Research in Attacks, Intrusions and Defenses (RAID). 337\u2013351","author":"Chung Keywhan","year":"2019","unstructured":"Keywhan Chung, Xiao Li, Peicheng Tang, Zeran Zhu, Zbigniew\u00a0T Kalbarczyk, Ravishankar\u00a0K Iyer, and Thenkurussi Kesavadas. 2019. Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID). 337\u2013351."},{"key":"e_1_3_2_1_19_1","unstructured":"Kevin Collier. 2021. In Florida a near-miss with a cybersecurity worst-case scenario. https:\/\/www.nbcnews.com\/tech\/security\/florida-near-miss-cybersecurity-worst-case-scenario-n1257091. [Online; Accessed May 2023]."},{"key":"e_1_3_2_1_20_1","volume-title":"Rockwell Automation MicroLogix Controllers and RSLogix 500 Software. https:\/\/us-cert.cisa.gov\/ics\/advisories\/icsa-20-070-06. [Online","author":"Cybersecurity and Infrastructure\u00a0Security Agency","year":"2023","unstructured":"Cybersecurity and Infrastructure\u00a0Security Agency. 2020. Rockwell Automation MicroLogix Controllers and RSLogix 500 Software. https:\/\/us-cert.cisa.gov\/ics\/advisories\/icsa-20-070-06. [Online; Accessed June 2023]."},{"key":"e_1_3_2_1_21_1","volume-title":"Scanning the Internet for ROS: A View of Security in Robotics Research. In 2019 International Conference on Robotics and Automation (ICRA). IEEE, 8514\u20138521","author":"DeMarinis Nicholas","year":"2019","unstructured":"Nicholas DeMarinis, Stefanie Tellex, Vasileios\u00a0P Kemerlis, George Konidaris, and Rodrigo Fonseca. 2019. Scanning the Internet for ROS: A View of Security in Robotics Research. In 2019 International Conference on Robotics and Automation (ICRA). IEEE, 8514\u20138521."},{"key":"e_1_3_2_1_22_1","volume-title":"FANUC Industrial Robots at AUDI. https:\/\/www.youtube.com\/watch?v=rbki4HR41-4. [Online","author":"Europe FANUC","year":"2023","unstructured":"FANUC Europe. 2017. FANUC Industrial Robots at AUDI. https:\/\/www.youtube.com\/watch?v=rbki4HR41-4. [Online; Accessed June 2023]."},{"key":"e_1_3_2_1_23_1","first-page":"29","article-title":"W32. Stuxnet Dossier. White paper, Symantec Corp","volume":"5","author":"Falliere Nicolas","year":"2011","unstructured":"Nicolas Falliere, Liam\u00a0O Murchu, and Eric Chien. 2011. W32. Stuxnet Dossier. White paper, Symantec Corp., Security Response 5, 6 (2011), 29.","journal-title":"Security Response"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2019.108698"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23265"},{"key":"e_1_3_2_1_26_1","volume-title":"Device Fingerprinting for Cyber-Physical Systems. In Symposium on Network and Distributed System Security (NDSS).","author":"Formby David","year":"2016","unstructured":"David Formby, Preethi Srinivasan, Andrew Leonard, Jonathan Rogers, and Raheem\u00a0A Beyah. 2016. Who\u2019s in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems. In Symposium on Network and Distributed System Security (NDSS)."},{"key":"e_1_3_2_1_27_1","volume-title":"Python bindings for libnetfilter_queue. https:\/\/pypi.org\/project\/NetfilterQueue. [Online","author":"Fox Matthew","year":"2023","unstructured":"Matthew Fox. 2023. Python bindings for libnetfilter_queue. https:\/\/pypi.org\/project\/NetfilterQueue. [Online; Accessed May 2023]."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23313"},{"key":"e_1_3_2_1_29_1","volume-title":"PAtt: Physics-based Attestation of Control Systems. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). 165\u2013180","author":"Ghaeini Hamid\u00a0Reza","year":"2019","unstructured":"Hamid\u00a0Reza Ghaeini, Matthew Chan, Raad Bahmani, Ferdinand Brasser, Luis Garcia, Jianying Zhou, Ahmad-Reza Sadeghi, Nils\u00a0Ole Tippenhauer, and Saman Zonouz. 2019. PAtt: Physics-based Attestation of Control Systems. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). 165\u2013180."},{"key":"e_1_3_2_1_30_1","unstructured":"Mikell\u00a0P. Groover. 2016. Automation Production Systems and Computer-Integrated Manufacturing."},{"key":"e_1_3_2_1_31_1","volume-title":"MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption. https:\/\/www.rapid7.com\/db\/modules\/exploit\/windows\/smb\/ms17_010_eternalblue. [Online","author":"Equation Group","year":"2023","unstructured":"Equation Group. 2018. MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption. https:\/\/www.rapid7.com\/db\/modules\/exploit\/windows\/smb\/ms17_010_eternalblue. [Online; Accessed May 2023]."},{"key":"e_1_3_2_1_32_1","unstructured":"Damodar\u00a0N. Gujarati and Dawn\u00a0C. Porter. 2009. Basic Econometrics."},{"key":"e_1_3_2_1_33_1","volume-title":"CHERNOVITE\u2019s PIPEDREAM Malware Targeting Industrial Control Systems (ICS). https:\/\/www.dragos.com\/blog\/industry-news\/chernovite-pipedream-malware-targeting-industrial-control-systems\/. [Online","author":"Dragos Inc. 2022.","year":"2023","unstructured":"Dragos Inc. 2022. CHERNOVITE\u2019s PIPEDREAM Malware Targeting Industrial Control Systems (ICS). https:\/\/www.dragos.com\/blog\/industry-news\/chernovite-pipedream-malware-targeting-industrial-control-systems\/. [Online; Accessed June 2023]."},{"key":"e_1_3_2_1_34_1","volume-title":"Exploitable vulnerabilities #1 (MS08-067). https:\/\/www.rapid7.com\/blog\/post\/2014\/02\/03\/new-ms08-067. [Online","author":"Johnson Leon","year":"2023","unstructured":"Leon Johnson. 2020. Exploitable vulnerabilities #1 (MS08-067). https:\/\/www.rapid7.com\/blog\/post\/2014\/02\/03\/new-ms08-067. [Online; Accessed May 2023]."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Takeaki Kariya and Hiroshi Kurata. 2004. Generalized Least Squares.","DOI":"10.1002\/0470866993"},{"key":"e_1_3_2_1_36_1","volume-title":"Metasploit: The Penetration Tester\u2019s Guide.","author":"Kennedy David","year":"2011","unstructured":"David Kennedy, Jim O\u2019gorman, Devon Kearns, and Mati Aharoni. 2011. Metasploit: The Penetration Tester\u2019s Guide."},{"key":"e_1_3_2_1_37_1","volume-title":"Collaborative robots in manufacturing and assembly systems: literature review and future research agenda. Journal of Intelligent Manufacturing","author":"Keshvarparast Ali","year":"2023","unstructured":"Ali Keshvarparast, Daria Battini, Olga Battaia, and Amir Pirayesh. 2023. Collaborative robots in manufacturing and assembly systems: literature review and future research agenda. Journal of Intelligent Manufacturing (2023), 1\u201354."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2826558"},{"key":"e_1_3_2_1_39_1","volume-title":"SoK: Security of Programmable Logic Controllers. In 33rd USENIX Security Symposium (USENIX Security).","author":"L\u00f3pez-Morales Efr\u00e9n","year":"2024","unstructured":"Efr\u00e9n L\u00f3pez-Morales, Ulysse Planta, Carlos Rubio-Medrano, Ali Abbasi, and Alvaro\u00a0A Cardenas. 2024. SoK: Security of Programmable Logic Controllers. In 33rd USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_40_1","volume-title":"Electronics Assembly - Nidec. https:\/\/www.youtube.com\/watch?v=jdL_2Y5Q6S4&t=10s. [Online","author":"Ltd Reeco\u00a0Automation","year":"2023","unstructured":"Reeco\u00a0Automation Ltd. 2019. Electronics Assembly - Nidec. https:\/\/www.youtube.com\/watch?v=jdL_2Y5Q6S4&t=10s. [Online; Accessed June 2023]."},{"key":"e_1_3_2_1_41_1","unstructured":"Daniele Marrone. 2022. The implementation of collaborative robots in production environments: a review of academic literature and industrial applications. (2022)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3150225"},{"key":"e_1_3_2_1_43_1","volume-title":"BMW iFactory \u2014 iX1 Production. https:\/\/www.youtube.com\/watch?v=bML5ZUyEiQw. [Online","author":"Media InGear","year":"2023","unstructured":"InGear Media. 2022. BMW iFactory \u2014 iX1 Production. https:\/\/www.youtube.com\/watch?v=bML5ZUyEiQw. [Online; Accessed June 2023]."},{"key":"e_1_3_2_1_44_1","unstructured":"Douglas\u00a0C. Montgomery. 2007. Introduction to Statistical Quality Control."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264894"},{"key":"e_1_3_2_1_46_1","volume-title":"Ransomware attack forces shutdown of largest fuel pipeline in the U.S.https:\/\/www.cnbc.com\/2021\/05\/08\/colonial-pipeline-shuts-pipeline-operations-after-cyberattack.html. [Online","author":"Newburger Emma","year":"2023","unstructured":"Emma Newburger. 2021. Ransomware attack forces shutdown of largest fuel pipeline in the U.S.https:\/\/www.cnbc.com\/2021\/05\/08\/colonial-pipeline-shuts-pipeline-operations-after-cyberattack.html. [Online; Accessed June 2023]."},{"key":"e_1_3_2_1_47_1","volume-title":"Security Notification - Modicon M100\/M200\/M221 Programmable Logic Controller (V3.0). https:\/\/www.se.com\/ww\/en\/download\/document\/SEVD-2020-315-05\/. [Online","author":"Electric\u00a0Security Notification Schneider","year":"2023","unstructured":"Schneider Electric\u00a0Security Notification. 2021. Security Notification - Modicon M100\/M200\/M221 Programmable Logic Controller (V3.0). https:\/\/www.se.com\/ww\/en\/download\/document\/SEVD-2020-315-05\/. [Online; Accessed June 2023]."},{"key":"e_1_3_2_1_48_1","volume-title":"Ettercap Home Page. https:\/\/www.ettercap-project.org. [Online","author":"Ornaghi Alberto","year":"2023","unstructured":"Alberto Ornaghi and Marco Valleri. 2020. Ettercap Home Page. https:\/\/www.ettercap-project.org. [Online; Accessed May 2023]."},{"key":"e_1_3_2_1_49_1","volume-title":"CORMAND2: A Deception Attack Against Industrial Robots. Engineering","author":"Pu Hongyi","year":"2023","unstructured":"Hongyi Pu, Liang He, Peng Cheng, Jiming Chen, and Youxian Sun. 2023. CORMAND2: A Deception Attack Against Industrial Robots. Engineering (2023)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.116.2200034"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430775"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.20"},{"key":"e_1_3_2_1_53_1","volume-title":"SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. In 29th USENIX Security Symposium (USENIX Security). 895\u2013912","author":"Quinonez Raul","year":"2020","unstructured":"Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, and Zhiqiang Lin. 2020. SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. In 29th USENIX Security Symposium (USENIX Security). 895\u2013912."},{"key":"e_1_3_2_1_54_1","unstructured":"Ravi Rao. 2023. What are Robotic Assembly Lines? History Components Advantages Limitations Applications and Future. https:\/\/www.wevolver.com\/article\/what-are-robotic-assembly-lines-history-components-advantages-limitations-applications-and-future. [Online; Accessed June 2023]."},{"key":"e_1_3_2_1_55_1","volume-title":"Application Manual PC SDK. ABB AB Robotic products","author":"Robotics ABB","year":"2015","unstructured":"ABB Robotics. 2015. Application Manual PC SDK. ABB AB Robotic products (2015), 204\u2013217."},{"key":"e_1_3_2_1_56_1","unstructured":"ABB Robotics. 2019. Product specification - IRB 120. https:\/\/library.e.abb.com\/public\/6aed5e91083f4fceb358eea2fe4c1bab\/3HAC035960%20PS%20IRB%20120-en.pdf?x-sign=edIex5StIjpgmJBJJ95tak9NHdyuuut6mzzJHESGKt5i1JG8dhLRBdvggKptgBJn. [Online; Accessed May 2023]."},{"key":"e_1_3_2_1_57_1","unstructured":"Nabil Sayfayn and Stuart Madnick. 2017. Cybersafety Analysis of the Maroochy Shire Sewage Spill (Preliminary Draft). (2017)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"Dimitrios Serpanos and Marilyn Wolf. 2018. Internet-of-Things (IoT) Systems Architectures Algorithms Methodologies.","DOI":"10.1007\/978-3-319-69715-4"},{"key":"e_1_3_2_1_59_1","unstructured":"Suresh\u00a0P Sethi and Qing Zhang. 2012. Hierarchical Decision Making in Stochastic Manufacturing Systems."},{"key":"e_1_3_2_1_60_1","volume-title":"dsniff. https:\/\/www.monkey.org\/\u00a0dugsong\/dsniff. [Online","author":"Song Dug","year":"2023","unstructured":"Dug Song. 2000. dsniff. https:\/\/www.monkey.org\/\u00a0dugsong\/dsniff. [Online; Accessed May 2023]."},{"key":"e_1_3_2_1_61_1","unstructured":"Catherine Stupp. 2021. Energy Tech Firm Hit in Ransomware Attack: Oslo-based Volue is working to restore systems and customer software after incident. https:\/\/www.wsj.com\/articles\/energy-tech-firm-hit-in-ransomware-attack-11620764034. [Online; Accessed June 2023]."},{"key":"e_1_3_2_1_62_1","volume-title":"OAT: Attesting Operation Integrity of Embedded Devices. In 2020 IEEE Symposium on Security and Privacy (S&P). IEEE, 1433\u20131449","author":"Sun Zhichuang","year":"2020","unstructured":"Zhichuang Sun, Bo Feng, Long Lu, and Somesh Jha. 2020. OAT: Attesting Operation Integrity of Embedded Devices. In 2020 IEEE Symposium on Security and Privacy (S&P). IEEE, 1433\u20131449."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.50.221"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Marilyn Wolf and Dimitrios Serpanos. 2020. Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems.","DOI":"10.1007\/978-3-030-25808-5"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3384146"},{"key":"e_1_3_2_1_67_1","volume-title":"PLC-Sleuth: Detecting and Localizing PLC Intrusions Using Control Invariants. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). 333\u2013348","author":"Yang Zeyu","year":"2020","unstructured":"Zeyu Yang, Liang He, Peng Cheng, Jiming Chen, David\u00a0KY Yau, and Linkang Du. 2020. PLC-Sleuth: Detecting and Localizing PLC Intrusions Using Control Invariants. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). 333\u2013348."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3434622"},{"key":"e_1_3_2_1_69_1","volume-title":"Towards Automated Safety Vetting of PLC Code in Real-World Plants. In Symposium on Security and Privacy (S&P).","author":"Zhang Mu","year":"2019","unstructured":"Mu Zhang, James Moyne, Z\u00a0Morley Mao, Chien-Ying Chen, Bin-Chou Kao, Yassine Qamsane, Yuru Shao, Yikai Lin, Elaine Shi, Sibin Mohan, 2019. Towards Automated Safety Vetting of PLC Code in Real-World Plants. In Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2928624"}],"event":{"name":"RAID '24: The 27th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID '24","location":"Padua Italy"},"container-title":["The 27th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678896","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678890.3678896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:00Z","timestamp":1750295880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678896"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":70,"alternative-id":["10.1145\/3678890.3678896","10.1145\/3678890"],"URL":"https:\/\/doi.org\/10.1145\/3678890.3678896","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-09-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}